Interoperable systems and methods for peer-to-peer service orchestration - Systems and methods are described for performing policy-managed, peer-to-peer service orchestration in a manner that supports the formation of self-organizing service networks that enable rich media experiences. In one embodiment, services are distributed across peer-to-peer communicating nodes, and each node provides message routing and orchestration using a message pump and workflow collator. Distributed policy management of service interfaces helps to provide trust and security, supporting commercial exchange of value. Peer-to-peer messaging and workflow collation allow services to be dynamically created from a heterogeneous set of primitive services. The shared resources are services of many different types, using different service interface bindings beyond those typically supported in a web service deployments built on UDDI, SOAP, and WSDL. In a preferred embodiment, a media services framework is provided that enables nodes to find one another, interact, exchange value, and cooperate across tiers of networks from WANs to PANs.

2010-01-07

20100005514

METHOD, SYSTEM AND SERVER FOR FILE RIGHTS CONTROL - A file rights control method, a file rights control system, and a server are described. The file rights control method includes: monitoring identity information of a file author; determining at least one authorization object of the file according to identity information of the file author; determining rights corresponding to different authorization objects of the file according to the identity information of the file author and the at least one authorization object of the file; and authorizing the at least one authorization object of the file according to the determined rights corresponding to different authorization objects of the file. A file rights control system and a server are further described. By using the embodiments of the present invention, the complexity of file authorization control operation is reduced, thus improving the working efficiency of users. Moreover, the authorization of a fine granularity and a higher security are ensured.

2010-01-07

20100005515

SYSTEMS AND METHODS FOR ASSOCIATE TO ASSOCIATE AUTHENTICATION - Systems, methods and consumer-readable media for providing a platform between a requesting associate and an authenticating entity associate are provided. The method may include receiving a request for authentication from the requesting associate and transmitting the request to the authenticating associate. The method may include receiving a request for a single-use verification code from the authenticating associate in response to the request for authentication. The method may also include generating the single-use verification code, or, perhaps retrieving the single-use verification code from storage and transmitting the single-use verification code to the authenticating associate. Once the requesting associate has receiving the code from the authenticating associate, the requesting associate may enter the code. The system may then display the identity of the requesting associate on a workstation associated with the authenticating associate.

2010-01-07

20100005516

METHOD AND SYSTEM FOR SECURE AGENT-LESS ENTERPRISE INFRASTRUCTURE DISCOVERY - A method and system for securing dynamic discovery of an enterprise computing infrastructure is provided. One implementation involves maintaining enterprise credential information in a secured trust store, receiving an access request through a secure connection for access to a remote infrastructure component, determining the type of the access request, for a root-level type access request, responding to the request via the secure connection with enterprise root credentials from the trust store, and for an unprivileged type access request, responding to the request via the secure connection with unprivileged access enterprise credentials from the trust store.

2010-01-07

20100005517

IPTV CONTENT SHARING IN IMS NETWORK - A Content Sharing AS facilitates the sharing of IPTV content distribution sessions between users in an IMS network. A first user's request to share an ongoing IPTV session is routed to the Content Sharing AS, with a SIP URI of a second user with whom to share the content, identification of the desired content, and the Mcast address of the IPTV session. The Content Sharing AS joins the IGMP session group and sends the first user a SIP URI for the content and a unique authentication token. The first user sends the content URI and token to the second user, such as via a SMS message. The second user may then send an SIP INVITE message toward the URI, which the IMS system routes to the Content Sharing AS. The second user provides the authentication token, which the Content Sharing AS uses to authenticate the second user, and share the IPTV content.

SYSTEM AND METHOD FOR AUTHENTICATING ONE-TIME VIRTUAL SECRET INFORMATION - A system for authenticating one-time virtual secret information includes a display device and an input device separated from each other, the display device having a central processing unit (CPU) and a memory and the input device having a CPU and a memory. An authentication server generates matching information, for display on the display device via a communication network. A user views this matching information and inputs the one-time virtual secret information to the input device. The input device then transmits the input one-time virtual secret information to the authentication server via a communication network, and the authentication server interprets the input one-time virtual secret information.

2010-01-07

20100005520

PERSONAL AREA SOCIAL NETWORKING - Techniques for managing the exchange of contact information are provided. Requests to establish connections on social networks and/or exchange contact information between users are held in escrow. The level of contact information and/or social network information shared between the users is configurable on a per user basis. Users may define levels of contact information and social network information to be shared with others based on the type of contact. Spam protection may be provided by requiring that both parties consent to a connection request before connections between the users are established.

2010-01-07

20100005521

Method of Securing Password in Web Page and Computer-Readable Recording Medium Storing Program for Executing the Same - Provided are a method of securing a password in a web page and a recording medium storing a program for executing the method. The method of accessing a web page provided by a specific web server through a web browser of a user terminal and then securing a password value input from a keyboard of the user terminal to a password input window provided by the web page includes encoding the password value input to the password input window, and then decoding the encoded password value at the same time when a log-in event of the web page occurs. According to the method, it is possible to prevent a password value input to a password input window of a web page from being intercepted by malicious programs before the password value is transmitted to the corresponding web server.

2010-01-07

20100005522

Digital transmission system (DTS) for computer security - This invention describes a hand held digital transmitter to transmit a signal as light (visible and invisible) or sound (audible and inaudible) or other digitized code for alphanumeric in any language, special characters or symbols or graphic or pictures or any combination thereof, to the computer system that is equipped with a compatible digital receiver and transmitter card. This card can transmit and receive the said signals and codes and a software driver and/or firmware for the operation, management and maintenance of this security system. Upon verification, of the transmitted code, by the computer system, access is granted. The computer system then transmits a randomly selected new code of any combination of the codes or signals stated above to the transmitter for storage in the said transmitter. The said transmission from the computer cannot be stored in any other hand held transmitter located within range of the transmission.

2010-01-07

20100005523

COMPUTING DEVICE WITH ENVIRONMENT AWARE FEATURES - A method and mobile electronic device are provided which automatically adjust settings based on the environment of the mobile electronic device. The settings of the mobile electronic device which are adjusted may be security settings, filter settings, or status for instant messaging in dependence on the determined location of the mobile electronic device.

Authorization method with hints to the authorization code - Authorizing a user for accessing a system, data, or a physical location is accomplished by receiving an authorization code from the user and determining whether the received code matches a valid authorization code. To relieve the user from the need of memorizing complex authorization codes, the authorizing party presents hints to a valid authorization code. The hints are presented concurrently with the user's entering of the authorization code.

2010-01-07

20100005526

INFORMATION PROCESSING APPARATUS AND METHOD - An information processing apparatus includes: a positional relation acquisition section that detects a person who is in a predetermined area around a display device and acquires a positional relation between the detected person and the display device; an authentication section that authenticates a person at an authentication position which is a position in the predetermined area; a control section that stores a correspondence between the positional relation and the state of displaying, associates, if a person is authenticated, the authenticated person, a person detected at the authentication position at the time of authentication, and a predetermined right of access, makes a determination as to whether or not the authenticated person has a right of access to the display information displayed, so as to change the correspondence according to the determination, and controls the state of displaying based on the correspondence and the positional relation.

2010-01-07

20100005527

SYSTEM AND METHOD FOR PROVIDING AND HANDLING EXECUTABLE WEB CONTENT - The present invention relates to a system for providing executable web content to a terminal. The present invention provides a system comprising a server, which provides an executable web content comprising a declarative language part in declarative language and a non-declarative part, and a gateway, which receives the executable web content from the server, converts it into a format executable in a web browser of the terminal, and transmits the converted content to the terminal.

2010-01-07

20100005528

METHODS FOR HOOKING APPLICATIONS TO MONITOR AND PREVENT EXECUTION OF SECURITY-SENSITIVE OPERATIONS - The present invention discloses methods and media for hooking applications to monitor and prevent execution of security-sensitive operations, the method including the steps of: reading at least one configuration parameter list from a configuration module; hooking, by a hooking engine, a hooking point in an application, wherein the hooking point is defined in the configuration module; calling, by the application, the hooking point during operation of the application; matching at least one hooking parameter in the hooking point to at least one configuration parameter in at least one configuration parameter list; and upon detecting a match between the hooking parameter and at least one configuration parameter, performing at least one configuration-defined action. Preferably, the method further includes the step of: updating a state of the hooking engine. Preferably, the hooking engine is operative to prevent malicious operations by obfuscated code.

2010-01-07

20100005529

PLATFORM VERIFICATION PORTAL - Described are computer-based methods and apparatuses, including computer program products, for a platform verification portal. A plurality of configuration items are stored with each comprising a plurality of verification commands capable of being executed by a verification scanning engine executing a verification scan on a target server to compare a set of actual software or configuration settings of the software against a desired software stack. A plurality of configuration item rules is stored. Execution of one or more verification scanning engines across a selected set of target servers is remotely initiated. A request for configuration items is received from each of the target servers. For each of the target servers a set of configuration items applicable to the target server is dynamically selected. For each of the target servers, a list identifying the set of configuration items is transmitted to the target server for execution by the verification scanning engine.

2010-01-07

20100005530

SYSTEM AND METHOD FOR SCANNING MEMORY FOR PESTWARE OFFSET SIGNATURES - Systems and methods for managing pestware processes on a protected computer are described. In one implementation, a reference point in the executable memory that is associated with a process running in the executable memory is located. A first and second sets of information from corresponding first and second portions of the executable memory are then retrieved. The first and second portions of the executable memory are separated by a defined offset, and each of the first and second portions of the executable memory are offset from the reference point. The process is identifiable as a particular type of pestware when the first and second sets of information each include information previously found to be separated by the defined offset in other processes that are of the particular type of pestware. In some variations, the reference point is a starting address and/or an API implementation in the process.

2010-01-07

20100005531

Isolated multiplexed multi-dimensional processing in a virtual processing space having virus, spyware, and hacker protection features - Information appliance, computing device, or other processor or microprocessor based device or system provides security and anti-viral, anti-hacker, and anti-cyber terror features, and can automatically create multiple sequentially or concurrently and intermittently isolated and/or restricted computing environments to prevent viruses, malicious or other computer hacking, computer or device corruption and failure by using these computing environments in conjunction with restricted and controlled methods of moving and copying data, combined with a process that destroys malicious code located in computing environments and data stores. Time multiplexed processing streams with system, device, architecture and method for maintaining isolation of multiple processes executing in single physical processor. Virtual multi-dimensional processing space and virtual processing environments. Temporally multiplexed processing in a single CPU. Process isolation using address control and mapping. Selecting, configuring, switching, and/or multiplexing multiple processes in physical and/or virtual processing or computing spaces to create physical and/or virtual processing or computing environments.

2010-01-07

20100005532

Software Usage Controlled by CPU Utilization - A data processing apparatus has a data processor manager that checks and updates the credit account that is associated with the usage of a software application at the apparatus. The processor manager determines whether or not to proceed with execution of the software application dependent on the number of processor cycles left in the credit account. If the number of processor cycles in the account falls below a predetermined threshold, the software application is barred from being executed further. The user then can replenish the account by means of purchasing or otherwise obtaining further credits in terms of processor cycles for spending on the future execution of the software application. In this manner, a scenario is implemented for a business model based on prepaid software wherein the user pays exactly for the actual usage in terms of processor cycles.

2010-01-07

20100005533

METHOD AND APPARATUS FOR PROTECTING RFID TAGS FROM POWER ANALYSIS - RFID tags were believed to be immune to power analysis since they have no direct connection to an external power supply. However, recent research has shown that they s are vulnerable to such attacks, since it is possible to measure their power consumption remotely via a completely passive attack. The method and apparatus of the invention protects RFID tags against simple and differential power attacks. The invention is particularly useful regarding inventory control systems or secure documents such as epassports. The basic technique is to use two capacitors embedded in the RFID tag in lo such a way that at any given time one of them is storing energy that is being generated by the charge pump of the tag that sucks energy from the electromagnetic or magnetic field of a tag reader, and the other one is discharging and powering the computational element of the tag chip.

2010-01-07

20100005534

SASPASE KNOCKOUT ANIMAL - Knockout animals in which a gene encoding a SASPase has been deleted (hereinafter, referred to as SASPase KO animals) are provided. The SASPase KO animals deficient in expression of functional SASPase were produced by deleting a gene encoding a stratified epithelium-specific protease, SASPase, through targeted disruption. The SASPase KO animals showed a significant increase in wrinkles on the sides of the body and so on. The SASPase KO animals find utility as animal models of wrinkles.

2010-01-07

20100005535

Compositions And Methods For Generating Transgenic Animals - The present invention provides methods of altering gene expression of embryos to provide compositions and methods for efficient generation of transgenic animals. In particular, the present invention provides compositions and methods for generating germ-line transgenic animals by direct injection of nucleic acid molecules into animals.

2010-01-07

20100005536

Promoter for Introducing a Gene into a Lymphocyte or Blood Cell and Application Thereof - It is intended to provide a promoter for inducing expression selectively and strongly in an immunocompetent cell and/or a blood cell such as a lymphocyte. In the invention, the object was achieved by finding that HHV6 MIE promoter, HHV7 MIE promoter and HHV7 U95 promoter unexpectedly induce a specific expression in an immunocompetent cell and/or a blood cell such as a T lymphocyte. By utilizing the promoters, a selective delivery of a DNA vaccine or the like can be realized.

LETTUCE LINE P2231-3013596 - The invention provides seed and plants of the lettuce line designated P2231-3013596. The invention thus relates to the plants, seeds and tissue cultures of lettuce line P2231-3013596, and to methods for producing a lettuce plant produced by crossing a plant of lettuce line P2231-3013596 with itself or with another lettuce plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing. The invention further relates to parts of a plant of lettuce line P2231-3013596, including the gametes of such plants.

2010-01-07

20100005539

COMPOSITIONS AND METHODS FOR MODIFYING GENE EXPRESSION USING THE PROMOTER OF UBIQUITIN CONJUGATING PROTEIN CODING GENE OF SOYBEAN PLANTS - A polynucleotide isolated from soybean plants capable of initiating transcription and with sequence identity to SEQ ID No.1 is provided. In some aspects, the polynucleotide has sequence identity to SEQ ID No. 1 of at least 40%, is the reverse complement or the reverse of such sequences. In some aspects, the polynucleotide is linked to expression enhancers or sequences of interest. In some embodiments, a recombinant vector comprises the polynucleotide. In some aspects, the recombinant vector comprises enhancers, termination sequences, or sequences of interest. In some embodiments a transformed cell, plant, plant part, or propagulum comprise the polynucleotide.

Scarecrow-Like Stress-Related Polypeptides and Methods of Use in Plants - A transgenic plant transformed with an SLSRP coding nucleic acid, wherein expression of the nucleic acid sequence in the plant results in increased growth under water-limited conditions and/or increased tolerance to an environmental stress as compared to a wild type variety of the plant. Also provided are agricultural products, including seeds, produced by the transgenic plants. Also provided are isolated SLSRPs, and isolated SLSRP coding nucleic acids, and vectors and host cells containing the latter.

2010-01-07

20100005543

TOXIN GENES AND METHODS FOR THEIR USE - Compositions and methods for conferring pesticidal activity to bacteria, plants, plant cells, tissues and seeds are provided. Compositions comprising a coding sequence for a delta-endotoxin polypeptide are provided. The coding sequences can be used in DNA constructs or expression cassettes for transformation and expression in plants and bacteria. Compositions also comprise transformed bacteria, plants, plant cells, tissues, and seeds. In particular, isolated delta-endotoxin nucleic acid molecules are provided. Additionally, amino acid sequences corresponding to the polynucleotides are encompassed, and antibodies specifically binding to those amino acid sequences. In particular, the present invention provides for isolated nucleic acid molecules comprising nucleotide sequences encoding the amino acid sequence shown in SEQ ID NO:61-121 and 133-141, or the nucleotide sequence set forth in SEQ ID NO:1-60, 124-132, and 142-283, as well as variants and fragments thereof.

Compositions and Methods of Using RNA Interference of SCA1-Like Genes for Control of Nematodes - The present invention concerns double stranded RNA compositions and transgenic plants capable of inhibiting expression of essential genes in parasitic nematodes, and methods associated therewith. Specifically, the invention relates to the use of RNA interference to inhibit expression of a target essential nematode gene, which is a nematode sca1-like gene, and relates to the generation of plants that have increased resistance to parasitic nematodes.

Nucleic Acid Sequences and Methods of Use for the Production of Plants with Modified Polyunsaturated Fatty Acids - By this invention, novel nucleic acid sequences are provided, wherein said nucleic acid sequence is a genomic sequence of a plant desaturase encoding sequence. Also provided in the present invention are the promoter and intron sequences of the desaturase genomic sequences. Furthermore, recombinant DNA constructs employing the polynucleotide sequences are provided. The instant invention also provides methods for the modification of fatty acid compositions in host plant cells.

2010-01-07

20100005549

INCREASING UV-B TOLERANCE IN PLANTS - Methods and materials related to UV-B tolerance in plants are disclosed, e.g., plants and seeds having a cell containing an exogenous nucleic acid encoding a polypeptide having UV-B tolerance activity.

PLANT PROTECTION - The invention provides seed treatment compositions as well as their use, methods for treating seeds, methods of protecting plants against pests and also treated seeds and plants. In one embodiment there is provided a method of treating a seed with a seed treatment composition to induce a plant resistance mechanism against one or more pests in a plant grown from said seed.

SIDEWALL TRACING NANOPROBES, METHOD FOR MAKING THE SAME, AND METHOD FOR USE - Sidewall tracing nanoprobes, in which the tip shape of the nanoprobe Is altered so that the diameter or width of the very tip of the probe is wider than the diameter of the supporting stem. Such side protruding probe tips are fabricated by a subtractive method of reducing the stem diameter, an additive method of increasing the tip diameter, or sideway bending of the probe tip. These sidewall tracing nanoprobes are useful for inspection of semiconductor devices, especially to quantitatively evaluate the defects on the side wall of trenches or via holes.